Author of the publication

Using the pattern-of-life in networks to improve the effectiveness of intrusion detection systems.

, , , , and . ICC, page 1-7. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A data fusion technique to detect wireless network virtual jamming attacks., , , , , and . M&N, page 1-6. IEEE, (2015)Evidential classification and feature selection for cyber-threat hunting., , and . Knowl. Based Syst., (2021)Detecting Signalling DoS Attacks on LTE Networks., , , and . INISCOM, volume 293 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 283-301. Springer, (2019)Compressing Computer Network Measurements Using Embedded Zerotree Wavelets., and . AICT, page 188-193. IEEE Computer Society, (2009)A Framework for Cross-Layer Measurements in Wireless Networks., , and . AICT, page 237-242. IEEE Computer Society, (2009)Automated Detection of Changes in Computer Network Measurements using Wavelets., and . ICCCN, page 1223-1227. IEEE, (2007)Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems., , and . MILCOM, page 46-51. IEEE, (2014)A Basic Probability Assignment Methodology for Unsupervised Wireless Intrusion Detection., , , , , and . IEEE Access, (2018)Evidential classification for defending against adversarial attacks on network traffic., , and . Inf. Fusion, (April 2023)Semi-Edge: From Edge Caching to Hierarchical Caching in Network Fog., , and . EdgeSys@MobiSys, page 43-48. ACM, (2018)